{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:05:03Z","timestamp":1769724303158,"version":"3.49.0"},"reference-count":36,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":1461,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Science of Computer Programming"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1016\/j.scico.2013.10.006","type":"journal-article","created":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T12:16:37Z","timestamp":1384172197000},"page":"426-444","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":27,"special_numbering":"P4","title":["SeByte: Scalable clone and similarity search for bytecode"],"prefix":"10.1016","volume":"95","author":[{"given":"Iman","family":"Keivanloo","sequence":"first","affiliation":[]},{"given":"Chanchal K.","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Juergen","family":"Rilling","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"9","key":"10.1016\/j.scico.2013.10.006_br0010","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TSE.2007.70725","article-title":"Comparison and evaluation of clone detection tools","volume":"33","author":"Bellon","year":"2007","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"7","key":"10.1016\/j.scico.2013.10.006_br0020","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","article-title":"Comparison and evaluation of code clone detection techniques and tools: A qualitative approach","volume":"74","author":"Roy","year":"2009","journal-title":"Sci. Comput. Program."},{"key":"10.1016\/j.scico.2013.10.006_br0030","series-title":"Proc. ISSRE","first-page":"3","article-title":"Scalable detection of semantic clones based on two-stage clustering","author":"Yoshioka","year":"2011"},{"key":"10.1016\/j.scico.2013.10.006_br0040","series-title":"Proc. ICSM","first-page":"244","article-title":"Experiment on the automatic detection of function clones in a software system using metrics","author":"Mayrand","year":"1996"},{"key":"10.1016\/j.scico.2013.10.006_br0050","series-title":"Proc. WCRE","first-page":"253","article-title":"Clone detection using abstract syntax suffix trees","author":"Koschke","year":"2006"},{"key":"10.1016\/j.scico.2013.10.006_br0060","series-title":"Proc. WCRE","first-page":"13","article-title":"On the effectiveness of simhash for detecting near-miss clones in large scale software systems","author":"Uddin","year":"2011"},{"key":"10.1016\/j.scico.2013.10.006_br0070","series-title":"Proc. IWSC","first-page":"34","article-title":"Automated Type-3 clone Oracle using Levenshtein metric","author":"Lavoie","year":"2011"},{"key":"10.1016\/j.scico.2013.10.006_br0080","series-title":"Proceedings of the Eighteenth ACM FSE","first-page":"167","article-title":"Instant code clone search","author":"Lee","year":"2010"},{"key":"10.1016\/j.scico.2013.10.006_br0090","article-title":"Word concepts: A theory and simulation of some basic capabilities","volume":"12","author":"Quillan","year":"1967","journal-title":"Behav. Sci."},{"key":"10.1016\/j.scico.2013.10.006_br0100","series-title":"12th International Conference on World Wide Web","first-page":"700","article-title":"Semantic search","author":"Guha","year":"2003"},{"key":"10.1016\/j.scico.2013.10.006_br0110","series-title":"Proc. IWPC","first-page":"49","article-title":"Extending software quality assessment techniques to Java systems","author":"Patenaude","year":"1999"},{"key":"10.1016\/j.scico.2013.10.006_br0120","series-title":"Proc. ESWC","first-page":"213","article-title":"OWL reasoning with WebPIE: calculating the closure of 100 billion triples","author":"Urbani","year":"2010"},{"key":"10.1016\/j.scico.2013.10.006_br0130","series-title":"9th Working Conference on Mining Software Repositories (MSR)","article-title":"A linked data platform for mining software repositories","author":"Keivanloo","year":"2012"},{"key":"10.1016\/j.scico.2013.10.006_br0140","series-title":"Proc. WCRE","first-page":"227","article-title":"Enhancing source-based clone detection using intermediate representation","author":"Selim","year":"2010"},{"key":"10.1016\/j.scico.2013.10.006_br0150","series-title":"Proc. WCRE","first-page":"242","article-title":"From whence it came: detecting source code clones by analyzing assembler","author":"Davis","year":"2010"},{"key":"10.1016\/j.scico.2013.10.006_br0160","series-title":"Proc. ATEC","first-page":"179","article-title":"Deducing similarities in Java source from bytecodes","author":"Baker","year":"1998"},{"key":"10.1016\/j.scico.2013.10.006_br0170","series-title":"Proc. ICPC","first-page":"172","article-title":"NICAD: accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization","author":"Roy","year":"2008"},{"key":"10.1016\/j.scico.2013.10.006_br0180","series-title":"Proc. WCRE","first-page":"315","article-title":"Enhancing quality of code clone detection with program dependency graph","author":"Higo","year":"2009"},{"key":"10.1016\/j.scico.2013.10.006_br0190","series-title":"26th IEEE International Conference on Software Maintenance (ICSM)","first-page":"1","article-title":"Index-based code clone detection: incremental, distributed, scalable","author":"Hummel","year":"2010"},{"issue":"7","key":"10.1016\/j.scico.2013.10.006_br0200","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","article-title":"CCFinder: a multilinguistic token-based code clone detection system for large scale source code","volume":"28","author":"Kamiya","year":"2002","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.scico.2013.10.006_br0210","series-title":"19th Working Conference on Reverse Engineering (WCRE)","article-title":"Detecting clones across Microsoft .NET programming languages","author":"Al-Omari","year":"2012"},{"key":"10.1016\/j.scico.2013.10.006_br0220","series-title":"20th IEEE International Conference on Program Comprehension (ICPC), Tool Demo. Track","article-title":"SeByte: a semantic clone detection tool for intermediate languages","author":"Keivanloo","year":"2012"},{"key":"10.1016\/j.scico.2013.10.006_br0230","series-title":"Proc. MoDELS","first-page":"258","article-title":"Semantic clone detection for model-based development of embedded systems","author":"Al-Batran","year":"2011"},{"key":"10.1016\/j.scico.2013.10.006_br0250","series-title":"Proc. IWSC","first-page":"73","article-title":"Clone detection through process algebras and Java Bytecode","author":"Santone","year":"2011"},{"key":"10.1016\/j.scico.2013.10.006_br0260","author":"Framework"},{"key":"10.1016\/j.scico.2013.10.006_br0270","series-title":"Proceedings of the 17th ACM SIGKDD","first-page":"15","article-title":"Supervised learning for provenance-similarity of binaries","author":"Chaki","year":"2011"},{"key":"10.1016\/j.scico.2013.10.006_br0280","series-title":"ISSTA","first-page":"117","article-title":"Detecting code clones in binary executables","author":"S\u00e6bj\u00f8rnsen","year":"2009"},{"key":"10.1016\/j.scico.2013.10.006_br0290","series-title":"International Working Conference on Mining Software Repositories","first-page":"63","article-title":"Finding software license violations through binary code clone detection","author":"Hemel","year":"2011"},{"key":"10.1016\/j.scico.2013.10.006_br0300","series-title":"20th International Conference on Software Engineering and Knowledge Engineering","article-title":"Cross-language clone detection","author":"Kraft","year":"2008"},{"key":"10.1016\/j.scico.2013.10.006_br0310","series-title":"Technology Interfaces (ITI)","first-page":"597","article-title":"Detecting source code similarity using low-level languages","author":"Juri\u010di\u0107","year":"2011"},{"key":"10.1016\/j.scico.2013.10.006_br0320","series-title":"6th Symposium on Operating Systems Design & Implementation","first-page":"137","article-title":"MapReduce: Simplified data processing on large clusters","author":"Dean","year":"2004"},{"key":"10.1016\/j.scico.2013.10.006_br0330","series-title":"6th International Workshop on Software Clones (IWSC)","article-title":"Java Bytecode clone detection via relaxation on code fingerprint and semantic Web reasoning","author":"Keivanloo","year":"2012"},{"key":"10.1016\/j.scico.2013.10.006_br0340","series-title":"Proc. IWSC","first-page":"1","article-title":"Achieving accurate clone detection results","author":"Juergens","year":"2010"},{"key":"10.1016\/j.scico.2013.10.006_br0350","series-title":"Introduction to Information Retrieval","author":"Manning","year":"2008"},{"key":"10.1016\/j.scico.2013.10.006_br0360","first-page":"547","article-title":"\u00c9tude comparative de la distribution florale dans une portion des Alpes et des Jura","volume":"37","author":"Jaccard","year":"1901","journal-title":"Bull. Soc. Vaud. Sci. Nat."},{"key":"10.1016\/j.scico.2013.10.006_br0370","series-title":"2nd International Workshop on Detection of Software Clones (IWDSC'03)","article-title":"Clone detector evaluation can be improved: ideas from information retrieval","author":"Walenstein","year":"2003"}],"container-title":["Science of Computer Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642313002773?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642313002773?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T21:02:15Z","timestamp":1543611735000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167642313002773"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":36,"alternative-id":["S0167642313002773"],"URL":"https:\/\/doi.org\/10.1016\/j.scico.2013.10.006","relation":{},"ISSN":["0167-6423"],"issn-type":[{"value":"0167-6423","type":"print"}],"subject":[],"published":{"date-parts":[[2014,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"SeByte: Scalable clone and similarity search for bytecode","name":"articletitle","label":"Article Title"},{"value":"Science of Computer Programming","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.scico.2013.10.006","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}